Логотип exploitDog
product: "django"
Консоль
Логотип exploitDog

exploitDog

product: "django"
Django

Djangoсвободный фреймворк для веб-приложений на языке Python, использующий шаблон проектирования MVC

Релизный цикл, информация об уязвимостях

Продукт: Django
Вендор: djangoproject

График релизов

4.25.05.15.22023202420252026202720282029

Недавние уязвимости Django

Количество 673

nvd логотип

CVE-2009-2659

почти 16 лет назад

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2009-2659

почти 16 лет назад

The Admin media handler in core/servers/basehttp.py in Django 1.0 and ...

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2009-2659

почти 16 лет назад

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2009-2659

почти 16 лет назад

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

EPSS: Низкий
nvd логотип

CVE-2008-3909

почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2008-3909

почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores u ...

CVSS2: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2008-3909

почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2008-2302

около 17 лет назад

Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2008-2302

около 17 лет назад

Cross-site scripting (XSS) vulnerability in the login form in the admi ...

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2008-2302

около 17 лет назад

Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.

CVSS2: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2009-2659

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

CVSS2: 5
2%
Низкий
почти 16 лет назад
debian логотип
CVE-2009-2659

The Admin media handler in core/servers/basehttp.py in Django 1.0 and ...

CVSS2: 5
2%
Низкий
почти 16 лет назад
ubuntu логотип
CVE-2009-2659

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

CVSS2: 5
2%
Низкий
почти 16 лет назад
redhat логотип
CVE-2009-2659

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

2%
Низкий
почти 16 лет назад
nvd логотип
CVE-2008-3909

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

CVSS2: 5.8
0%
Низкий
почти 17 лет назад
debian логотип
CVE-2008-3909

The administration application in Django 0.91, 0.95, and 0.96 stores u ...

CVSS2: 5.8
0%
Низкий
почти 17 лет назад
ubuntu логотип
CVE-2008-3909

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

CVSS2: 5.8
0%
Низкий
почти 17 лет назад
nvd логотип
CVE-2008-2302

Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.

CVSS2: 4.3
0%
Низкий
около 17 лет назад
debian логотип
CVE-2008-2302

Cross-site scripting (XSS) vulnerability in the login form in the admi ...

CVSS2: 4.3
0%
Низкий
около 17 лет назад
ubuntu логотип
CVE-2008-2302

Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.

CVSS2: 4.3
0%
Низкий
около 17 лет назад

Уязвимостей на страницу


Поделиться